Legal Representation
Attorney
Alicia A. Matusheski
USPTO Deadlines
Next Deadline
8 days remaining
Published for Opposition
Due Date
December 25, 2025
Extension Available
Until January 25, 2026
Application History
16 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Nov 25, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Nov 25, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Nov 19, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Oct 28, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Oct 27, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 27, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Oct 27, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Aug 1, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Aug 1, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Aug 1, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Aug 1, 2025 | ZZZX | Z | PREVIOUS ALLOWANCE COUNT WITHDRAWN | Loading... |
| Jul 31, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Jul 28, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jul 17, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Feb 21, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Feb 21, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Application service provider (ASP) featuring software using artificial intelligence for cybersecurity breach or insider threat detection and automated response; Computer programming consultancy in the field of cybersecurity breach or insider threat detection and automated response; Computer software development, computer programming and maintenance of computer software for cybersecurity breach or insider threat detection and automated response, and access management; Consultancy in the field of artificial intelligence technology; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Cybersecurity services in the nature of restricting unauthorized access to computer systems, data, and apps; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Platform as a service (PAAS) featuring computer software platforms for cybersecurity breach or insider threat detection and automated response, and access management; Providing a website featuring non-downloadable software using artificial intelligence for cybersecurity breach or insider threat detection and automated response; Providing temporary use of a web-based software application for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of non-downloadable cloud-based software for cybersecurity; Providing temporary use of non-downloadable web-based decentralized applications (DApps) for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of on-line non-downloadable cloud computing software for cybersecurity; Providing temporary use of on-line non-downloadable opensource software for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence for cybersecurity breach or insider threat detection and automated response, and access management; Technology consultation in the field of artificial intelligence; Technology consultation in the field of cybersecurity; Computer technology consultancy in the field of cybersecurity; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services
First Use Anywhere:
Oct 18, 2020
First Use in Commerce:
Dec 3, 2020
Additional Information
Design Mark
The mark consists of the word MIMOTO in a stylized type font.
Translation
The English translation of the Japanese wording MIMOTO in the mark is Identity.
Classification
International Classes
042